Section:  .. / 0311-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 40 of 40
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: boomerang.tgz
Description:
Local exploit for the ListBox/ComboBox vulnerabilities in Win32 platforms. Included is an example of a vulnerable program.
Author:xCrZx
Related File:MS03-045
File Size:3638
Last Modified:Nov 14 03:05:55 2003
MD5 Checksum:2535d98788c7d94b7b1bc63be67d9adf

 ///  File Name: o_wks.c
Description:
Remote exploit for the Microsoft Windows Workstation server (WKSSVC) buffer overflow.
Author:Snooq
Homepage:http://www.angelfire.com/linux/snooq/
Related File:ms03-049
File Size:12873
Last Modified:Nov 14 02:59:56 2003
MD5 Checksum:42f040aa646dd00f2ed65f55541c93a4

 ///  File Name: chemtrailX.c
Description:
Proof of concept local root exploit for iwconfig that is normally not setuid by default. Tested on RedHat Linux 9.0.
Author:Knight420
File Size:1728
Last Modified:Nov 14 02:42:59 2003
MD5 Checksum:b3da4e4973f8442505f7f11bb2442480

 ///  File Name: iw-config.c
Description:
Proof of concept local root exploit for iwconfig, which is not setuid by default.
Author:heka
File Size:1344
Last Modified:Nov 14 02:17:07 2003
MD5 Checksum:5a3507650d6a7aa825d9cc3694338c88

 ///  File Name: termxploit.c
Description:
TerminatorX version 3.81 and below local root exploit. Makes use of vulnerabilities discussed in this related advisory.
Author:phender
File Size:2650
Last Modified:Nov 14 02:12:09 2003
MD5 Checksum:8b5061ce2be4afdf626e722708c4230e

 ///  File Name: terminatorX-exp.c
Description:
TerminatorX version 3.81 and below local root exploit. Bruteforcing option included. Makes use of vulnerabilities discussed in this related advisory.
Author:Li0n7
File Size:6825
Last Modified:Nov 14 02:10:03 2003
MD5 Checksum:04ab215e46ffae3ec92f1b86dc5cfa09

 ///  File Name: rpc!exec.c
Description:
Windows remote rpc dcom exploit which bypasses non-executable stack protection by using return into libc. Tested against OverflowGuard and StackDefender (with kernel32 imagebase randomization) running on Windows 2000 SP0 and Windows XP SP0.
Author:ins1der
File Size:16612
Last Modified:Nov 8 05:20:15 2003
MD5 Checksum:9e3ef780cbba1ba342d85d3417f43325

 ///  File Name: badc0ded-DSR-ensim.sh
Description:
Virthostmail (part of the Ensim WEBppliance Pro) local exploit for Linux/x86. Tested on Ensim 3.5.20-7 and others. Bug found by Kokanin.
Author:Joel Eriksson
File Size:696
Last Modified:Nov 8 03:20:28 2003
MD5 Checksum:dfc06bc790ea5e5dcbea2f03b8eb6269

 ///  File Name: DSR-wmapm.sh
Description:
Wmapm v3.1 local exploit - Gives a shell with UID=operator in FreeBSD if compiled via ports collection, or UID=root if compiled from source on FreeBSD or Linux. Requires a valid X display.
Author:Knud Erik Højgaard
Homepage:http://kokanins.homepage.dk
File Size:831
Last Modified:Nov 8 03:16:52 2003
MD5 Checksum:9c96e222a97fbced2e4789d67c4f010f

 ///  File Name: cf_exp.c
Description:
Cfservd v2.0.7 and below remote stack overflow exploit. Includes connect-back and port binding shellcode. Tested against cfservd v2.0.7 on Redhat 8.0. Info on the bug available here.
Author:Snooq
Homepage:http://www.angelfire.com/linux/snooq/
File Size:12665
Last Modified:Nov 8 03:10:25 2003
MD5 Checksum:217fbdd97894588d7e1efd1f536b044e

 ///  File Name: Mircxpl.pl
Description:
Remote exploit for mIRC versions below 6.12 that will cause the victim's client to crash.
Author:Jackal.
File Size:1112
Last Modified:Nov 5 06:01:00 2003
MD5 Checksum:afd42a6a9c7cc811f4b482ebdeb88690

 ///  File Name: 85NIPrint.c
Description:
Remote exploit for Windows that makes use of the buffer overflow vulnerability in NIPrint discussed here.
Author:xCrZx
File Size:6010
Last Modified:Nov 4 18:14:36 2003
MD5 Checksum:067bbc3934292c0e48f3957e9ae13d9a

 ///  File Name: kpopup.txt
Description:
Kpopup version 0.9.1 is susceptible to allowing privilege escalation due to format string bugs and an unsafe system() call. Local root exploit included.
Author:b0f
Homepage:http://www.b0f.net
File Size:3743
Last Modified:Nov 4 08:16:18 2003
MD5 Checksum:ef5877dfcaad27f0f1cbd792ee2650aa

 ///  File Name: shatterCommCtrl.txt
Description:
Shatter attack exploit against CommCtrl 6.0 Buttons. This write up and exploit demonstrates that any privileged application, which makes use of the Microsoft XP visual styles and creates a window on the interactive desktop, can be used by an attacker to gain elevated privileges.
Author:Oliver Lavery
File Size:7516
Last Modified:Nov 4 07:11:38 2003
MD5 Checksum:d08ebed3d21207d68c67d22e9b554a1d

 ///  File Name: xmjong.c
Description:
mah-jong version 1.4 server/client remote buffer overflow exploit that makes use of the SetPlayerOption command in the server and the PlayerOptionSet command in the client.
Author:vade79/v9
File Size:15756
Last Modified:Nov 4 07:02:11 2003
MD5 Checksum:5c35b328c236f41bef652d708c08ca6b